cybersecsi / houdiniLinks
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
☆1,241Updated last year
Alternatives and similar repositories for houdini
Users that are interested in houdini are comparing it to the libraries listed below
Sorting:
- A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.☆553Updated last week
- 📚 A curated list of awesome Docker security resources☆681Updated 2 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,133Updated 9 months ago
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,119Updated last year
- ☆570Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,166Updated this week
- A curated list of awesome CI CD security resources☆552Updated 9 months ago
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆489Updated 2 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,250Updated 2 years ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆895Updated 2 years ago
- My cheatsheet notes to pentest AWS infrastructure☆682Updated 2 years ago
- Checklist for container security - devsecops practices☆1,583Updated last year
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,894Updated 2 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆993Updated last month
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,459Updated 2 years ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,035Updated last week
- Run popular commandline tools within docker☆1,263Updated last year
- all paths lead to clouds☆638Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,729Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆3,079Updated 3 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,914Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆2,099Updated last week
- API Security Project aims to present unique attack & defense methods in API Security field☆1,398Updated last year
- Dangerously fast DNS/network/port scanner☆909Updated 3 years ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,228Updated 9 months ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆751Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,184Updated 2 months ago
- A DFIR tool written in Python.☆1,050Updated 4 years ago
- A Blazing fast Security Auditing tool for Kubernetes☆999Updated last year
- List of regex for scraping secret API keys and juicy information.☆707Updated 2 years ago